Commit e6a91149 by fwkz

Vendor scanners.

parent 62c165b8
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for 2wire vulnerabilities.
"""
__info__ = {
'name': '2wire Scanner',
'description': 'Scanner module for 2wire devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'2wire',
),
}
vendor = '2wire'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for 3com vulnerabilities.
"""
__info__ = {
'name': '3com Scanner',
'description': 'Scanner module for 3com devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'3com',
),
}
vendor = '3com'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Asmax vulnerabilities.
"""
__info__ = {
'name': 'Asmax Scanner',
'description': 'Scanner module for Asmax devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Asmax',
),
}
vendor = 'asmax'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Asus vulnerabilities.
"""
__info__ = {
'name': 'Asus Scanner',
'description': 'Scanner module for Asus devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Asus',
),
}
vendor = 'asus'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Belkin vulnerabilities.
"""
__info__ = {
'name': 'Belkin Scanner',
'description': 'Scanner module for Belkin devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Belkin',
),
}
vendor = 'belkin'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Cisco vulnerabilities.
"""
__info__ = {
'name': 'Cisco Scanner',
'description': 'Scanner module for Cisco devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Cisco',
),
}
vendor = 'cisco'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Comtrend vulnerabilities.
"""
__info__ = {
'name': 'Comtrend Scanner',
'description': 'Scanner module for Comtrend devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Comtrend',
),
}
vendor = 'comtrend'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Fortinet vulnerabilities.
"""
__info__ = {
'name': 'Fortinet Scanner',
'description': 'Scanner module for Fortinet devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Fortinet',
),
}
vendor = 'fortinet'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Huawei vulnerabilities.
"""
__info__ = {
'name': 'Huawei Scanner',
'description': 'Scanner module for Huawei devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Huawei',
),
}
vendor = 'huawei'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Ipfire vulnerabilities.
"""
__info__ = {
'name': 'Ipfire Scanner',
'description': 'Scanner module for Ipfire devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Ipfire',
),
}
vendor = 'ipfire'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Juniper vulnerabilities.
"""
__info__ = {
'name': 'Juniper Scanner',
'description': 'Scanner module for Juniper devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Juniper',
),
}
vendor = 'juniper'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Linksys vulnerabilities.
"""
__info__ = {
'name': 'Linksys Scanner',
'description': 'Scanner module for Linksys devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Linksys',
),
}
vendor = 'linksys'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Multi vulnerabilities.
"""
__info__ = {
'name': 'Multi Scanner',
'description': 'Scanner module for Multi devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Multi',
),
}
vendor = 'multi'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Netcore vulnerabilities.
"""
__info__ = {
'name': 'Netcore Scanner',
'description': 'Scanner module for Netcore devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Netcore',
),
}
vendor = 'netcore'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Netgear vulnerabilities.
"""
__info__ = {
'name': 'Netgear Scanner',
'description': 'Scanner module for Netgear devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Netgear',
),
}
vendor = 'netgear'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Netsys vulnerabilities.
"""
__info__ = {
'name': 'Netsys Scanner',
'description': 'Scanner module for Netsys devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Netsys',
),
}
vendor = 'netsys'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Shuttle vulnerabilities.
"""
__info__ = {
'name': 'Shuttle Scanner',
'description': 'Scanner module for Shuttle devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Shuttle',
),
}
vendor = 'shuttle'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Technicolor vulnerabilities.
"""
__info__ = {
'name': 'Technicolor Scanner',
'description': 'Scanner module for Technicolor devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Technicolor',
),
}
vendor = 'technicolor'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Thomson vulnerabilities.
"""
__info__ = {
'name': 'Thomson Scanner',
'description': 'Scanner module for Thomson devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Thomson',
),
}
vendor = 'thomson'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for TP-Link vulnerabilities.
"""
__info__ = {
'name': 'TP-Link Scanner',
'description': 'Scanner module for Netgear devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'TP-Link',
),
}
vendor = 'tplink'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Ubiquiti vulnerabilities.
"""
__info__ = {
'name': 'Ubiquiti Scanner',
'description': 'Scanner module for Ubiquiti devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Ubiquiti',
),
}
vendor = 'ubiquiti'
from __future__ import absolute_import
from .autopwn import Exploit as BaseScanner
class Exploit(BaseScanner):
"""
Scanner implementation for Zte vulnerabilities.
"""
__info__ = {
'name': 'Zte Scanner',
'description': 'Scanner module for Zte devices',
'authors': [
'Mariusz Kupidura <f4wkes[at]gmail.com>', # routersploit module
],
'references': (
'',
),
'devices': (
'Zte',
),
}
vendor = 'zte'
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment